The vulnerability of distributed state estimator under stealthy attacks

被引:26
|
作者
Sui, Tianju
Sun, Xi-Ming [1 ]
机构
[1] Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equip, Minist Educ, Dalian, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Cyber-physical systems; Distributed state estimation; Security; Stealthy attacks; CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1016/j.automatica.2021.109869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on a spatially large linear system with a distributed array of sensors, each of which offers partial state measurements. Suppose that each sensor runs a distributed state estimator and they may be suffering either partially or fully manipulated stealthy attacks. A partially manipulated attack can inject data to replace the measurements from an infected sensor. While, a fully manipulated attack can totally control the infected sensor including its computation and transmission. Moreover, an attack on sensor is called stealthy if it produces bounded changes in the detection residue. We will study both the impacts of partially and fully manipulated stealthy attacks on the distributed state estimator. Correspondingly, a distributed state estimation system is called vulnerable if one of its local estimate can be destabilized by a stealthy attack. Considering both static and dynamic systems, we will provide four necessary and sufficient conditions for the vulnerability of static/dynamic system under partially/fully manipulated stealthy attacks. Numerical examples are given to illustrate the theoretical results. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Vulnerability Analysis of Distributed State Estimator Under False Data Injection Attacks
    Li, Pengyu
    Ye, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5235 - 5244
  • [2] The Vulnerability of Cyber-Physical System Under Stealthy Attacks
    Sui, Tianju
    Mo, Yilin
    Marelli, Damian
    Sun, Ximing
    Fu, Minyue
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (02) : 637 - 650
  • [3] Vulnerability analysis of distributed state estimation under joint deception attacks
    Wang, Haojun
    Liu, Kun
    Han, Dongyu
    Xia, Yuanqing
    AUTOMATICA, 2023, 157
  • [4] Globally Stealthy Attacks Against Distributed State Estimation in Smart Grid
    Xu, Shaojie
    Ye, Dan
    Li, Guangdi
    Yang, Dongsheng
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, : 1 - 11
  • [5] Resilient Distributed State Estimation Under Stealthy Attack
    Lv, Yujiao
    Lu, Jianquan
    Liu, Yang
    Lou, Jungang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3254 - 3263
  • [6] Vulnerability analysis for a class of nonlinear cyber-physical systems under stealthy attacks
    Zhang, Qirui
    Dai, Wei
    Yang, Chunyu
    Chen, Xinkai
    AUTOMATICA, 2024, 167
  • [7] Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy Attacks
    Zhao, Chengcheng
    He, Jianping
    Cheng, Peng
    Chen, Jiming
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2017, 64 (06) : 5107 - 5117
  • [8] Resilient Consensus-Based Distributed Filtering: Convergence Analysis Under Stealthy Attacks
    Huang, Jiahao
    Tang, Yang
    Yang, Wen
    Li, Fangfei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (07) : 4878 - 4888
  • [9] Research on Secure State Estimation and Recovery Control for CPS under Stealthy Attacks
    Yang, Biao
    Xin, Liang
    Long, Zhiqiang
    ACTUATORS, 2023, 12 (11)
  • [10] Distributed Resilient Estimator Design for Positive Systems Under Topological Attacks
    Xiao, Shunyuan
    Ge, Xiaohua
    Han, Qing-Long
    Zhang, Yijun
    IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (07) : 3676 - 3686